Your network contains an Active Directory domain named contoso.com. You need to identify whether the Company attribute replicates to the global catalog. Which part of the Active Directory partition should you view? To answer, select the appropriate Active Directory object in the answer area.

Correct Answer:

Explanation:

Schema -Contains the Schema container, which stores class and attribute definitions for all existing and possible Active Directory objects in cn=schema,cn=configuration,dc= forestRootDomain . Updates to this container are replicated to all domain controllers in the forest. You can view the contents of the Schema container in the Active Directory Schema console.

http://technet.microsoft.com/en-us/library/cc961591.aspx

QUESTION 182

Hotspot Question

You have a server named Server1. Server1 runs Windows Server 2012 R2 and has the Windows Deployment Services (WDS) server role installed.

You install the DHCP Server server role on Server1.

You need to ensure that Server1 can respond to DHCP clients and WDS clients.

What should you configure for the DHCP service and the WDS service?

To answer, configure the appropriate options in the answer area.

Correct Answer:

Explanation:

Traditionally, only DHCP listened on port UDP 67, but now WDS also listens on port UDP 67 WDS and DHCP are installed on the same server: You must tell WDS not to listen on port UDP 67, leaving it available for DHCP traffic only. But then how does the client find the WDS server? You set option 60 in DHCP.

The DHCP option 60, when set to “PXEClient” is used only to instruct the PXE clients to try to use a PXE Service bound on UDP port 4011. Actually, if there is a bootp or dhcp service bound on UDP port 67 of an host (usually called a server), a PXE service cannot bind on that port on that host. Since the PXE Service uses BOOTP/DHCP packets to send the options 66 and 67 to the clients, it needs to be able to bind to the associated port (bootps) or to an alternated port (4011) that the clients know they must use as the alternate port. And to instruct the clients to use this alternate port, you have to set dhcp option 60 to “PXEClient”.

If Windows Deployment Services and DHCP are running on the same computer, configuring Windows Deployment Services to not respond to any client computers will not work. This is because although Windows Deployment Services will not respond, DHCP will. You should disable WDS if you have both installed and using DHCP.

To configure Windows Deployment Services to run on the same computer as Microsoft DHCP

Right-click the server and click Properties.On the DHCP tab, select Do not listen on port 67 and Configure DHCP Option #60 Tag to PXEClient.

This procedure does the following: Sets

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWDSServerParameters UseDhcpPorts to 0. Adds the option 60 PXEClient tag to all of your DHCP scopes.

You have a server named Server1. Server1 runs Windows Server 2012 R2. A user named Admin1 is a member of the local Administrators group.

You need to ensure that Admin1 receives a User Account Control (UAC) prompt when attempting to open Windows PowerShell as an administrator.

Which setting should you modify from the Local Group Policy Editor?

To answer, select the appropriate setting in the answer area.

Correct Answer:

QUESTION 184

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. What should you create?

A.

a storage pool on Disk 2 and Disk 3

B.

a spanned volume on Disk 2 and Disk 3

C.

a mirrored volume on Disk 1 and Disk 3

D.

a mirrored volume on Disk 2 and Disk 3

E.

a RAID-5 volume on Disk 1, Disk 2, and Disk 3

F.

a storage pool on Disk 1 and Disk 3

G.

a spanned volume on Disk 0 and Disk 4

H.

a mirrored volume on Disk 1 and Disk 4

Correct Answer: D

QUESTION 185

You have a server that runs Windows Server 2012 R2. The server contains the disks configured as shown in the following table.

You need to create a volume that can store up to 3 TB of user files. The solution must ensure that the user files are available if one of the disks in the volume fails. What should you create?

A.

A mirrored volume on Disk 1 and Disk 4

B.

A storage pool on Disk 2 and Disk 3

C.

A storage pool on Disk 1 and Disk 3

D.

A mirrored volume on Disk 2 and Disk 3

Correct Answer: D

A mirrored volume provides an identical twin of the selected volume. All data written to the mirrored volume is written to both volumes, which results in disk capacity of only 50 percent.

Any volume can be mirrored, including the system and boot volumes. The disk that you select for the shadow volume does not need to be identical to the original disk in size, or in its number of tracks and cylinders. This means that you do not have to replace a failed disk with an identical model. The unused area that you select for the shadow volume cannot be smaller than the original volume. If the area that you select for the shadow volume is larger than the original, the extra space on the shadow disk can be configured as another volume.

Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).

Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. All client computers run Windows 7. The computer accounts for all of the client computers are located in an organizational unit (OU) named OU1. An administrator links a Group Policy object (GPO) to OU1. The GPO contains several application control policies. You discover that the application control policies are not enforced on the client computers. You need to modify the GPO to ensure that the application control policies are enforced on the client computers. What should you configure in the GPO?

To answer, select the appropriate service in the answer area.

Correct Answer:

Explanation:

Does AppLocker use any services for its rule enforcement?

Yes, AppLocker uses the Application Identity service (AppIDSvc) for rule enforcement. For AppLocker rules to be enforced, this service must be set to start automatically in the GPO.

http://technet.microsoft.com/en-us/library/ee619725%28v=ws.10%29.aspx

QUESTION 187

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Served, and Server3. You create a server group named ServerGroup1. You discover the error message shown in the following exhibit. (Click the Exhibit button.)

You need to ensure that Server2 can be managed remotely by using Server Manager. What should you do?

A.

On DC1, run the Enable-PSSessionConfiguration cmdlet.

B.

On Server2, run the Add-Computer cmdlet.

C.

On Server2/ modify the membership of the Remote Management Users group.

D.

From Active Directory Users and Computers, add a computer account named Server2, and then

restart Server2.

Correct Answer: C

Explanation:

This is a security issue. To be able to access Server2 remotely through Server Manager the user need to be a member of the Remote Management Users group.

Note:

* Name: BUILTINRemote Management Users

Description: A Builtin Local group. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.

* Enable-ServerManagerStandardUserRemoting

Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing by using Server Manager.

Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing, either locally or remotely, by using Server Manager. The cmdlet must be run locally on the server that you are managing by using Server Manager. The cmdlet works by performing the following actions:

Adds access rights for specified standard users to the rootcimv2 namespace on the local server (for access to role and feature inventory information).

Changes access rights in the Service Control Manager to allow specified standard users remote access to th
e status of services on the managed server.

Incorrect:

Not A: the Enable-PSSessionConfiguration.This is an advanced cmdlet that is designed to be used by system administrators to manage customized session configurations for their users.

Reference: Enable-ServerManagerStandardUserRemoting

QUESTION 188

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. An iSCSI SAN is available on the network. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. You create a LUN on the SAN. You need to provide VM1 with access to the LUN. The solution must prevent other virtual machines from accessing the LUN. What should you configure?

A.

A fixed-size VHDX

B.

A fixed-size VHD

C.

A
dynamically expanding VHD

D.

A dynamically expanding VHDX

E.

A pass-through disk

Correct Answer: E

Explanation:

You can use physical disks that are directly attached to a virtual machine as a storage option on themanagement operating system. This allows virtual machines to access storage that is mapped directly to theserver running Hyper-V without first configuring the volume. The storage can be either a physical disk which isinternal to the server, or a SAN logical unit number (LUN) that is mapped to the server (a LUN is a logicalreference to a portion of a storage subsystem). The virtual machine must have exclusive access to thestorage, so the storage must be set in an Offline state in Disk Management. The storage is not limited insize, so it can be a multiterabyte LUN. When using physical disks that are directly attached to a virtual machine, you should be aware of the following:

This type of disk cannot be dynamically expanded.

You cannot use differencing disks with them.

You cannot take virtual hard disk snapshots.

Att:

If you are installing an operating system on the physical disk and it is in an Online state before the virtualmachine is started, the virtual machine will fail to start. You must store the virtual machine configuration file inan alternate location because the physical disk is used by the operating system installation. For example,locate the configuration file on another internal drive on the server running Hyper-V.

Your network contains an Active Directory domain named contoso.com. The domain contains a print server named Server1 that runs Windows Server 2012 R2. Server1 contains a local group named Group1.

You share a printer named Printer1 on Server1.

You need to configure Printer1 to meet the following requirements:

– Ensure that the members of Group1, the Server Operators group, the Administrators group, and the Print Operators group can send print jobs to Printer1.

– Prevent other users from sending print jobs to Printer1.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.

Assign the Print permission to the Server Operators group

B.

Remove the permissions for the Creator Owner group.

C.

Remove the permissions for the Everyone group.

D.

Assign the Print permission to Group1.

E.

Assign the Print permission to the Administrators group.

Correct Answer: CD

Explanation:

C: To prevent other users from sending print jobs to Printer1

D: To enable Group1 to send print jobs.

Note: The Server Operators group, the Administrators group, and the Print Operators group are all built-in and already have permissions to send print jobs.

QUESTION 190

You have a new server named Server1 that runs Windows Server 2012 R2. Server1 has two dual-core processors and 32 GB of RAM.

You install the Hyper-V server role on Server1.

You create two virtual machines on Server1 that each have 8 GB of memory.

You need to minimize the amount of time it takes for both virtual machines to access memory.

What should you configure on each virtual machine?

A.

Resource control

B.

Dynamic Memory

C.

NUMA topology

D.

Memory weight

Correct Answer: C

Explanation:

* Dynamic Memory is a new Hyper-V feature that helps you use physical memory more efficiently. With Dynamic Memory, Hyper-V treats memory as a shared resource that can be reallocated automatically among running virtual machines. Dynamic Memory adjusts the amount of memory available to a virtual machine, based on changes in memory demand and values that you specify. Dynamic Memory is available for Hyper-V in Windows Server 2008 R2 Service Pack 1 (SP1).

* Dynamic Memory helps you use memory resources more efficiently. Before this feature was introduced, changing the amount of memory available to a virtual machine could be done only when the virtual machine was turned off. With Dynamic Memory, Hyper-V can provide a virtual machine with more or less memory dynamically in response to changes in the amount of memory required by the workloads or applications running in the virtual machine. As a result, Hyper-V can distribute memory more efficiently among the running virtual machines configured with Dynamic Memory. Depending on factors such as workload, this efficiency can make it possible to run more virtual machines at the same time on one physical computer.